PENGAMANAN FILE DOKUMEN MENGGUNAKAN KOMBINASI METODE SUBTITUSI DAN VIGENERE CIPHER
Cryptography is a method of securing data using algorithms that have been developed continuously until now. Cryptography offers security in the form of data confidentiality, for example the confidentiality of data generated through encryption algorithms that scrambles personal information so that it...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Fakultas Ilmu Komputer UMI
2019-12-01
|
Series: | Ilkom Jurnal Ilmiah |
Subjects: | |
Online Access: | http://jurnal.fikom.umi.ac.id/index.php/ILKOM/article/view/477 |
_version_ | 1819130076700082176 |
---|---|
author | Sarwo Budi Arif Budimansyah Purba Jajang Mulyana |
author_facet | Sarwo Budi Arif Budimansyah Purba Jajang Mulyana |
author_sort | Sarwo Budi |
collection | DOAJ |
description | Cryptography is a method of securing data using algorithms that have been developed continuously until now. Cryptography offers security in the form of data confidentiality, for example the confidentiality of data generated through encryption algorithms that scrambles personal information so that it cannot be read or solved by unauthorized parties. One of them is the substitution algorithm and the vigenere cipher is a classic method used for data security. The combination of these algorithm methods becomes a solution for double security as file protection. By using a cryptographic application for data security, the combination of the two method algorithms produces a data file that provides more security to the text file so that it is not easy and difficult to solve. |
first_indexed | 2024-12-22T08:53:52Z |
format | Article |
id | doaj.art-7ce8e6e568514ae2963689cb96ba44f3 |
institution | Directory Open Access Journal |
issn | 2087-1716 2548-7779 |
language | English |
last_indexed | 2024-12-22T08:53:52Z |
publishDate | 2019-12-01 |
publisher | Fakultas Ilmu Komputer UMI |
record_format | Article |
series | Ilkom Jurnal Ilmiah |
spelling | doaj.art-7ce8e6e568514ae2963689cb96ba44f32022-12-21T18:31:54ZengFakultas Ilmu Komputer UMIIlkom Jurnal Ilmiah2087-17162548-77792019-12-0111322223010.33096/ilkom.v11i3.477.222-230180PENGAMANAN FILE DOKUMEN MENGGUNAKAN KOMBINASI METODE SUBTITUSI DAN VIGENERE CIPHERSarwo Budi0Arif Budimansyah Purba1Jajang Mulyana2STMIK Kharisma KarawangSTMIK Kharisma KarawangSTMIK Kharisma KarawangCryptography is a method of securing data using algorithms that have been developed continuously until now. Cryptography offers security in the form of data confidentiality, for example the confidentiality of data generated through encryption algorithms that scrambles personal information so that it cannot be read or solved by unauthorized parties. One of them is the substitution algorithm and the vigenere cipher is a classic method used for data security. The combination of these algorithm methods becomes a solution for double security as file protection. By using a cryptographic application for data security, the combination of the two method algorithms produces a data file that provides more security to the text file so that it is not easy and difficult to solve.http://jurnal.fikom.umi.ac.id/index.php/ILKOM/article/view/477cryptographysubtitutionvigenere ciphersdlc waterfall |
spellingShingle | Sarwo Budi Arif Budimansyah Purba Jajang Mulyana PENGAMANAN FILE DOKUMEN MENGGUNAKAN KOMBINASI METODE SUBTITUSI DAN VIGENERE CIPHER Ilkom Jurnal Ilmiah cryptography subtitution vigenere cipher sdlc waterfall |
title | PENGAMANAN FILE DOKUMEN MENGGUNAKAN KOMBINASI METODE SUBTITUSI DAN VIGENERE CIPHER |
title_full | PENGAMANAN FILE DOKUMEN MENGGUNAKAN KOMBINASI METODE SUBTITUSI DAN VIGENERE CIPHER |
title_fullStr | PENGAMANAN FILE DOKUMEN MENGGUNAKAN KOMBINASI METODE SUBTITUSI DAN VIGENERE CIPHER |
title_full_unstemmed | PENGAMANAN FILE DOKUMEN MENGGUNAKAN KOMBINASI METODE SUBTITUSI DAN VIGENERE CIPHER |
title_short | PENGAMANAN FILE DOKUMEN MENGGUNAKAN KOMBINASI METODE SUBTITUSI DAN VIGENERE CIPHER |
title_sort | pengamanan file dokumen menggunakan kombinasi metode subtitusi dan vigenere cipher |
topic | cryptography subtitution vigenere cipher sdlc waterfall |
url | http://jurnal.fikom.umi.ac.id/index.php/ILKOM/article/view/477 |
work_keys_str_mv | AT sarwobudi pengamananfiledokumenmenggunakankombinasimetodesubtitusidanvigenerecipher AT arifbudimansyahpurba pengamananfiledokumenmenggunakankombinasimetodesubtitusidanvigenerecipher AT jajangmulyana pengamananfiledokumenmenggunakankombinasimetodesubtitusidanvigenerecipher |